1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
1 year ago
9

What option in the zone aging/scavenging properties dialog box will prevent dns record time stamps from being updated too often?

Computers and Technology
2 answers:
Maksim231197 [3]1 year ago
8 0

A timestamp is sent to each record that a DNS client creates. The most frequent reason for DNS records disappearing from DNS zones is scavenging.

<h3>What is a timestamp in a DNS record?</h3>

A timestamp is sent to each record that a DNS client creates. Every 24 hours, the DNS client tries to update this record. The timestamp is locked for default of seven days and cannot be renewed until the record is altered (for instance, the client gets a new IP address).

Resource records are the official term for DNS (domain name system) records. Furthermore, we classify them as DNS query types on the BlueCat platform. Both of these names are used equally. Approximately 90 different forms of official resource records exist.

The most frequent reason for DNS records disappearing from DNS zones is scavenging. Every 24 hours, records on Windows-based systems with statically allocated servers are registered. Check to see if the No Refresh and Refresh intervals are inadequate.

Therefore, the correct answer is option c. No-refresh interval

The complete question is:

What option in the Zone Aging/Scavenging Properties dialog box will prevent DNS record time stamps from being updated too often?

a. The zone can be scavenged after

b. Scavenge stale resource records

c. No-refresh interval

d. Refresh interval

To learn more about DNS records refer to:

brainly.com/question/9686093

#SPJ4

professor190 [17]1 year ago
5 0

Answer:

The statement is true

Explanation:

You might be interested in
Mention two hardware groups​
mars1129 [50]

Answer:

input Devices, Processing Devices, Output Devices, Memory/Storage Devices

Explanation:

4 0
3 years ago
Which are types of lines? Choose three answers.
alekssr [168]
Straight
Curvilinear
Rectilinear
7 0
3 years ago
Write a program that prompts the user to enter the minutes (e.g., 1 billion), and displays the number of years and days for the
konstantin123 [22]

Answer:

// here is code in c++.

// include headers

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

long long int minutes,years,days;

long long int s;

cout<<"please enter the minutes:";

 // read the minutes

cin>>minutes;

 // make a copy

s=minutes;

 // calculate days

days=minutes/1440;

 // calculate years

years=days/365;

 // calculate remaining days after years

days=days%365;

// print the result

cout<<s<<" minutes is equal to "<<years<<" years "<<days<<" days."<<endl;

return 0;

}

Explanation:

Read the number of minutes from user and assign it to variable "minutes" of long long int type.Make a copy of input minutes.Then calculate total days by dividing the input minutes with 1440, because there is 1440 minutes in a day.Then find the year by dividing days with 365.Then find the remaining days and print the output.

Output:

please enter the minutes:1000000000                                                                                                                          

1000000000 minutes is equal to 1902 years 214 days.

4 0
3 years ago
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
What does usb stand for
e-lub [12.9K]
Universal Serial Bus
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following guidelines about forwarding e-mail messages is most appropriate?
    12·2 answers
  • Which is an example of appropiate online behavior?
    6·1 answer
  • Clep allows students to do all of thw following except which?
    9·2 answers
  • Write a C++ program that allows the user to enter double values. Display one of two messages: "The first number you entered is l
    9·1 answer
  • Peter was working on a design for a magazine. He had to give his design to his team for further editing. He wanted to use a file
    8·1 answer
  • Host Y sends the first TCP ACK message for the transaction?<br><br> a. true<br><br> b. false
    9·1 answer
  • Write an if statement that prints the message ""The number is not valid"" if the variable distance is outside the range 100 thr
    8·1 answer
  • A company has a number of employees. The attributes of EMPLOYEE include Employee ID (identifier), Name, Address, and Birthdate.
    11·1 answer
  • How are computers connected to one another?
    5·2 answers
  • Explain input device​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!